SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 1 (Jan-Feb 2015), PP. 109-112
109 | P a g e
Camera
EFFICIENT EMBEDDED SURVEILLANCE
SYSTEM WITH AUTO IMAGE CAPTURING AND
EMAIL SENDING FACILITY
Rohit Ratnakar Vaidya
Department of Electronics & communication Engineering
Deogiri Institute of Engineering and Management Studies,
Aurangabad (MS), India
Vaidyarohit007@gmail.com
Abstract— In this paper we have to design and implement
surveillance system by use of smart sensors like ultrasonic
sensors and pyroelectric infrared sensors (PIR) to detect an
intruder in a home, ATM, Industries, Bank Locker room or a
storehouse. The PIR sensors are placed on the ceiling, and the
ultrasonic sensor module consists of a transmitter and a receiver
which are placed vertically on the wall. We are going to use the
camera to capture images of the people those are coming under
the surveillance area. And we are sending these images to
authorized and related personnel via e-mail to avoid the storage
cost. This system will also help to reduce the power consumption.
Keywords—AVR Microcontroller; Raspberry Pi; Surveillance
System; PIR and ultrasonic Sensors; Webcam; Internet
Connections
I. INTRODUCTION
Recently surveillance systems have become more important
for everyone’s and everywhere for the purpose of security. The
embedded surveillance system, frequently used in a home, an
office or a factory [1-3], uses a sensor triggered to turn on a
camera [4-5]. Some designs use different types of sensors to
achieve reliability by means of the different features of each
sensor [6-7] but they do not provide any facilities like sending
an image through internet. In this paper we have to extend this
previous system not only by using both multiple PIR sensors
and ultrasonic sensors as a sensor group, but also by using the
Maximum Voting Mechanism (MVM) [8-11]. Ultrasonic
receivers and transmitters are located at opposite ends to
reduce the interference from other frequencies in ultrasonic
signals. Some research explores the influence of attenuation in
air and crosstalk of ultrasonic signals. In our system, We have
to use Raspberry Pi credit card-sized computer to send an
Email of captured image to the specified Email ID. So that
there is no issue of storing images as well no issue of losing
the confidential data (captured images).
II. SYSTEM ARCHITECTURE
As shown in Fig. 1 our system which contains several
groups of ultrasonic and PIR sensor. The transmitter circuit
generates a multi-frequency square waveform, and the receiver
circuit amplifies the received signals and filters out any noise.
When a transmitter transmits an ultrasonic coding signal, the
ultrasonic receiver determines whether there is an intruder or
person passing through the sensing area. If there is no
intruder, the MCU (Micro Controller Unit) will keep our
camera off but as soon as intruder is detected and camera can
capture the image. Our design reduces the environmental
interference with the ultrasonic signal. All sensing signals are
input to the embedded surveillance system by the GPIO
(General purpose input and output), and the MVM program
counts the number of sensing states to determine whether to
adopt the MVM or not. The PIR sensor groups obtain the
sensing signals from human temperature. If the voting results
of ultrasonic and PIR sensor groups pass the criteria, the
embedded surveillance system starts the camera to capture
images. When it capture the image this image is send to the
specified Email ID via Internet.
Internet Connectivity
Figure 1. Use of smart sensors to improve the sensing reliability of an
embedded surveillance system
A. Software Required
We choose Embedded Linux as our operating system. The
program of the majority voting mechanism contains a
detection of the GPIO function, a counting and majority voting
function, an image captured function and a Web server.
Fig.3.2 shows the detection software flowchart of the
embedded system. The embedded system scans the GPIO
sockets, which are connected to external PIR sensors and
ultrasonic sensors. To verify the state of each IR and ultrasonic
sensor, the embedded system reads the voltage levels of the
GPIO sockets. When the system reads 5V from a GPIO
socket, we learn that the ultrasonic sensors or the PIR sensors
have been triggered and will execute the majority voting
program by counting the state of each ultrasonic and PIR
sensor. Majority voting is achieved by the sensor groups of the
different GPIO sockets. The embedded system, when
interrupted by the detection procedure, starts the Web camera
to capture images. When this is finished, the embedded system
starts the detection procedure over again. If the intruder is still
in the monitoring area, the count of the GPIO sockets’ voltage
levels continues the majority voting mechanism, and the
embedded system again starts the Web camera to capture
images. The embedded system uploads the captured images by
means of both the Web server and the streaming server
through the Internet.
User
PIR Sensor
groups
Ultrasonic
Sensors
Groups
Signal
Conditi
-oning Raspberry
Pi
Internet
Remote Place
International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 1 (Jan-Feb 2015), PP. 109-112
110 | P a g e

Figure 2. Detection software flowchart

B. Hardware modules
We use two groups of the external hardware circuits, the PIR
and the ultrasonic sensor group. As the PIR sensor produces a
weak voltage, we input the sensed signal to a two-stage OP
amplifier to amplify the weak voltage by about 1000 times.
Since the amplified signal changes between positive
Figure 3. PIR module.
and negative voltage, we input this signal to the absolute value
circuit, and then we input it to the adjustable comparator to
and negative voltage, we input this signal to the absolute value
circuit, and then we input it to the adjustable comparator to
compare the sensing voltage and the reference voltage which
are set according to the environment temperature. Fig. 3 shows
the block diagram of the PIR module. Compact and complete,
easy to use Pyroelectric Infrared (PIR) Sensor Module for
human body detection. Incorporating a Fresnel lens and
motion detection circuit. High sensitivity and low noise.
Output is a standard 5V active low output signal.
Fig. 4 shows the ultrasonic circuit which uses a pulse
width modulation (PWM) function in the MCU to send out the
desired frequency of the ultrasonic signal. The ultrasonic
transducer transforms the voltage waveform into an ultrasonic
transmission, and the transducer of the receiver transforms the
ultrasonic transmission into the voltage waveform. The
ultrasonic sensor can easily be interfaced to microcontrollers
where the triggering and measurement can be done using two
I/O pin. The sensor transmits an ultrasonic wave and produces
an output pulse that corresponds to the time required for the
burst echo to return to the sensor. By measuring the echo pulse
width, the distance to target can easily be calculated.
Figure 4. Ultrasonic Sensor with Controller
Table I shows our comparison of the sensing characteristics of
both the ultrasonic sensor and the PIR sensor [6]. We have
found that the ultrasonic sensor and the PIR sensor can both
compensate each other and enhance the overall sensing
probability in our design.
TABLE I. COMPARISON OF CHARACTERISTICS OF PIR
SENSOR AND ULTRASONIC SENSOR
Sensors
Condition
For trigger
Effect of
Environment
temperature
Sensing
Type
Ultrasonic
Moving
block
Independence
Line
direction
PIR
Temperature
change
Dependence
Projection
area
Why Raspberry Pi?
 The Raspberry Pi is a credit-card-sized single-board
computer developed in the UK. The Raspberry Pi has
a Broadcom BCM2835 system on a ip (SoC), which
includes an ARM1176JZF- 700 MHz processor,
Video Core IV GPU, and was originally shipped
with 256 megabytes of RAM, later upgraded to
512 MB. It does not include a built-in hard
disk or solid-state drive, but uses an SD card for
booting and persistent storage.
 The Processor. At the heart of the Raspberry Pi is the
same processor you would have found in the iPhone
3G and the Kindle 2, so you can think of the
capabilities of the Raspberry Pi as comparable to
those powerful little devices. This chip is a 32 bit,
700 MHz System on a Chip, which is built on the
ARM11 architecture. ARM chips come in a variety of
architectures with different cores configured to
provide different capabilities at different price points.
The Model B has 512MB of RAM and the Model A
has 256 MB.
 The Secure Digital (SD) Card slot. You’ll notice
there’s no hard drive on the Pi; everything is stored
on an SD Card. One reason you’ll want some sort of
protective case sooner than later is that the solder
joints on the SD socket may fail if the SD card is
accidentally bent.
 The USB port. On the Model B there are two USB
2.0 ports, but only one on the Model A. Some of the
early Raspberry Pi boards were limited in the amount
of current that they could provide. Some USB devices
can draw up 500mA. The original Pi board supported
100mA or so, but the newer revisions are up to the
full USB 2.0 spec.
Features of coding signal-
In this paper we use a coding signal to increase the reliability
of the ultrasonic sensor group. Equation (1) is the function of
probability of code breaking. Equation (2) is the function of
reliability. when the number of bits increases, the reliability
approaches 1. According to Eqs. (1) and (2) we know that with
one bit if the probability of code breaking is 0.5, the reliability
would be 0.5. To increase the number of bits of the ultrasonic
signal code is to increase the reliability.
(1)
R=1-P
International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 1 (Jan-Feb 2015), PP. 109-112
111 | P a g e
III. ARRANGEMENT
Fig.6 shows Arrangement of our experimental environment
that detect intruders in a suitable place. We place the PIR
sensor on the ceiling or above the detection area. Transmitter
and receiver of the ultrasonic sensor module are placed in a
line direction. When an intruder enters the detection area, the
ultrasonic coding signal will be blocked and the PIR sensors
will detect temperature changes.
Figure 6. Arrangement of our experimental environment.
Table II compares our coding signal and noncoding signal.
The coding signal is not interfered with by other frequencies
unless their patterns are similar. It is easier to break a
noncoding signal than a coding signal. When we add to the
bits of the ultrasonic coding signal, the message type rise with
. A noncoding signal transmits just two types of messages,
0 and 1. N means number of bits. With more message types,
more codes can be used in the same design to decrease the
probability of breaking a signal. In our design, when N is
equal to 8, the message conbination of the ultrasonic coding
signal is 128 times better than that of noncoding signal, and
the reliability is enhanced from 0.5 to 0.996 as shown in Eq.
(1).
TABLE II. COMPARISON OF OUR CODING SIGNAL AND
NONCODING SIGNAL
Ultrasonic
signal
patterns
Interference
by other
ultrasonic
signal
Probability
of
breaking
signal
Message
combination
Reliability
Coding Low Low High
Noncoding High High 2 Low
IV. PERFORMANCE ANALYSIS
A. Ultrasonic Sensor-
TABLE III TABLE OF ULTRASONIC SENSOR EQUIVALENT
OUTPUT VOLTAGE
DISATANCE VOLTAGE
15 CM 0.06 mV
20 CM 0.08 mV
25 CM 0.10 mV
30 CM 0.12 mV
Figure 7.Ultrasonic Sensor Voltage Vs Distance Graph
With 2.5V - 5.5V power provides very short to long-range
detection and ranging, in an incredibly small package. The
LV-Max detects objects from 0-inches to 254-inches (6.45-
meters) and provides sonar range information from 6-inches
out to 254-inches with 1-inch resolution. Objects from 0-
inches to 6-inches range as 6-inches. The interface output
formats
IMAGE 1
In Image 1 Upper line of LCD shows the distance of object
from all three ultrasonic sensors. Lower line shows all three
PIR sensors are ON.
IMAGE 2
In image 2 we can see that we get a new mail. Which is like a
any common mail. We can send this email to many email ids.
International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 1 (Jan-Feb 2015), PP. 109-112
112 | P a g e
IMAGE 3
In image 3 we can see that image is attached to mail. This is
just 70kb to 100kb. That is very small. Here we can see that
image “someone is inside the ATM”
Emails Used-
From: rohitpiproject@gmail.com
To: vaidyarohit007@gmail.com
IMAGE 4
In image 4 we can see the image when we click on the
image.
V. CONCLUSION
This system shows two different types of sensors which are
Improving the overall sensing probability by using the MVM
to reduce the shortcomings of both the ultrasonic sensors and
the PIR sensors. As well as we are providing the facility of
sending live images to certain (Authorized) person via
EMAIL. In future may be we are also able to send some
videos (clips).
REFERENCES
[1] Jun Hou, Chengdong Wu, Zhongjia Yuan, Jiyuan Tan,
Qiaoqiao Wang and Yun Zhou, “Research of Intelligent
Home Security Surveillance System Based on ZigBee,”
International Symposium on Intelligent Information
Technology Application Workshops, Shanghai, 21-22 Dec.
2008, pp. 554-57.
[2] Xiangjun Zhu, Shaodong Ying and Le Ling, “Multimedia
sensor networks design for smart home surveillance,”
Control and Decision Conference, 2008, Chinese, 2-4 July
2008, pp. 431-435.
[3] L. Lo Presti, M. La Cascia, “Real-Time Object Detection in
Embedded Video Surveillance Systems,” Ninth
International Workshop on Image Analysis for Multimedia
Interactive Services, 7-9 May 2008, pp. 151-154.
[4] Wen-Tsuen Chen, Po-Yu Chen, Wei-Shun Lee and Chi-Fu
Huang, “Design and Implementation of a Real Time Video
Surveillance System with Wireless Sensor Networks,” VTC
Spring 2008. IEEE Vehicular Technology Conference, 11-
14 May 2008, pp. 218-222.
[5] Mikko Nieminen, Tomi Raty, and Mikko Lindholm,
“Multi-Sensor Logical Decision Making in the Single
Location Surveillance Point System,” Fourth International
Conference on Systems, France, 1-6 March 2009, pp. 86-
90.
[6] Ying-Wen Bai, Li-Sih Shen and Zong-Han Li, “Design and
Implementation of an Embedded Surveillance System by
Use of Multiple Ultrasonic Sensors”, The 28th IEEE
International Conference on Consumer Electronics, Las
Vegas, Nevada, USA, 11-13 Jan. 2010, 11.1-3, pp. 501-
502.
[7] Yang Cao, Huijie Zhao, Na Li and Hong Wei “Land-Cover
Classification by Airborne LIDAR Data Fused with Aerial
Optical Images,” International Workshop on Multi-
Platform/Multi-Sensor Remote Sensing and Mapping
(M2RSM), Jan. 2011, pp. 1-6.
[8] Hai-Wen Zhao, Hong Yue, and He-Gao Cai, “Design of a
Distributed Ultrasonic Detecting System Based on
Multiprocessor for Autonomous Mobile Robot,”
Proceedings of tbe 2007 WSEAS Int. Conference on
Circuits, Systems, Signal and Telecommunications, Gold
Coast, Australia, January 17-19, 2007, pp. 59-64.
[9] Zi-LI Xie and Zong-Han Li, “Design and implementation
of a home embedded surveillance system with ultra-low
alert power,” IEEE Transactions on Consumer Electronics,
Feb. 2011, pp. 153-159.
[10] Francesco Alonge, Marco Brancifortem and Francesco
Motta, “A novel method of distance measurement based on
pulse position modulation and synchronization of chaotic
signals using ultrasonic radar systems,” IEEE Transactions
on Instrumentation and Measurement, Feb.2009, pp. 318-
329.
[11] Shraga Shoval and Johann Borenstein, “Using Coded
Sognals to Benefit from Ultrasonic Sensor Crosstalk in
Mobile Robot Obstacle Avoidance,” IEEE International
Conference on Robotics and Automation, Seoul, Korea, 21-
26 May, 2001, vol.3, pp. 2879-2884.

More Related Content

What's hot

IRJET-An Automatic Fire Detection and Warning System under Home Video Surveil...
IRJET-An Automatic Fire Detection and Warning System under Home Video Surveil...IRJET-An Automatic Fire Detection and Warning System under Home Video Surveil...
IRJET-An Automatic Fire Detection and Warning System under Home Video Surveil...IRJET Journal
 
IRJET- Iot Based Wireless Sensor Network for Earlier Detection and Prevention...
IRJET- Iot Based Wireless Sensor Network for Earlier Detection and Prevention...IRJET- Iot Based Wireless Sensor Network for Earlier Detection and Prevention...
IRJET- Iot Based Wireless Sensor Network for Earlier Detection and Prevention...IRJET Journal
 
Wild fire monitoring system
Wild fire monitoring systemWild fire monitoring system
Wild fire monitoring systemJohn Mahlalela
 
IRJET- Automated Targeting System for Open Space Military Area
IRJET- Automated Targeting System for Open Space Military AreaIRJET- Automated Targeting System for Open Space Military Area
IRJET- Automated Targeting System for Open Space Military AreaIRJET Journal
 
Secured Spy for Highly Secured Areas
Secured Spy for Highly Secured AreasSecured Spy for Highly Secured Areas
Secured Spy for Highly Secured AreasIRJET Journal
 
Implementation of vehicle ventilation system using NodeMCU ESP8266 for remote...
Implementation of vehicle ventilation system using NodeMCU ESP8266 for remote...Implementation of vehicle ventilation system using NodeMCU ESP8266 for remote...
Implementation of vehicle ventilation system using NodeMCU ESP8266 for remote...journalBEEI
 
An IOT Project Integrated with RFID and GPRS
An IOT Project Integrated with RFID and GPRSAn IOT Project Integrated with RFID and GPRS
An IOT Project Integrated with RFID and GPRSIJMTST Journal
 
Low cost smart weather station using Arduino and ZigBee
Low cost smart weather station using Arduino and ZigBeeLow cost smart weather station using Arduino and ZigBee
Low cost smart weather station using Arduino and ZigBeeTELKOMNIKA JOURNAL
 
Ijeee 33-36-surveillance system for coal mines based on wireless sensor network
Ijeee 33-36-surveillance system for coal mines based on wireless sensor networkIjeee 33-36-surveillance system for coal mines based on wireless sensor network
Ijeee 33-36-surveillance system for coal mines based on wireless sensor networkKumar Goud
 
IRJET- Animal Identification in Roads and Alert System for Passengers usi...
IRJET-  	  Animal Identification in Roads and Alert System for Passengers usi...IRJET-  	  Animal Identification in Roads and Alert System for Passengers usi...
IRJET- Animal Identification in Roads and Alert System for Passengers usi...IRJET Journal
 
Design and implementation smart home alarm system with zigbee transceiver
Design and implementation smart home alarm system with zigbee transceiverDesign and implementation smart home alarm system with zigbee transceiver
Design and implementation smart home alarm system with zigbee transceiverzaidinvisible
 
IRJET- Home Surveillance Without using CCTV Camera
IRJET-  	  Home Surveillance Without using CCTV CameraIRJET-  	  Home Surveillance Without using CCTV Camera
IRJET- Home Surveillance Without using CCTV CameraIRJET Journal
 
IRJET- Intruder Detection Security System
IRJET- Intruder Detection Security SystemIRJET- Intruder Detection Security System
IRJET- Intruder Detection Security SystemIRJET Journal
 
IRJET-Protection for Women using IoT Smart Device with Location and Parameters
IRJET-Protection for Women using IoT Smart Device with Location and ParametersIRJET-Protection for Women using IoT Smart Device with Location and Parameters
IRJET-Protection for Women using IoT Smart Device with Location and ParametersIRJET Journal
 
Integrated Mine Safety Monitoring and Alerting System Using Zigbee & Can Bus
Integrated Mine Safety Monitoring and Alerting System Using Zigbee & Can BusIntegrated Mine Safety Monitoring and Alerting System Using Zigbee & Can Bus
Integrated Mine Safety Monitoring and Alerting System Using Zigbee & Can BusIOSR Journals
 
ENERGY MANAGEMENT USING ANDROID APPLICATION
ENERGY MANAGEMENT USING ANDROID APPLICATIONENERGY MANAGEMENT USING ANDROID APPLICATION
ENERGY MANAGEMENT USING ANDROID APPLICATIONJournal For Research
 
IRJET- Low Cost Personal Digital Assistant with IoT and WSN Capabilities
IRJET- Low Cost Personal Digital Assistant with IoT and WSN CapabilitiesIRJET- Low Cost Personal Digital Assistant with IoT and WSN Capabilities
IRJET- Low Cost Personal Digital Assistant with IoT and WSN CapabilitiesIRJET Journal
 

What's hot (20)

IRJET-An Automatic Fire Detection and Warning System under Home Video Surveil...
IRJET-An Automatic Fire Detection and Warning System under Home Video Surveil...IRJET-An Automatic Fire Detection and Warning System under Home Video Surveil...
IRJET-An Automatic Fire Detection and Warning System under Home Video Surveil...
 
IRJET- Iot Based Wireless Sensor Network for Earlier Detection and Prevention...
IRJET- Iot Based Wireless Sensor Network for Earlier Detection and Prevention...IRJET- Iot Based Wireless Sensor Network for Earlier Detection and Prevention...
IRJET- Iot Based Wireless Sensor Network for Earlier Detection and Prevention...
 
Wild fire monitoring system
Wild fire monitoring systemWild fire monitoring system
Wild fire monitoring system
 
IRJET- Automated Targeting System for Open Space Military Area
IRJET- Automated Targeting System for Open Space Military AreaIRJET- Automated Targeting System for Open Space Military Area
IRJET- Automated Targeting System for Open Space Military Area
 
Secured Spy for Highly Secured Areas
Secured Spy for Highly Secured AreasSecured Spy for Highly Secured Areas
Secured Spy for Highly Secured Areas
 
Implementation of vehicle ventilation system using NodeMCU ESP8266 for remote...
Implementation of vehicle ventilation system using NodeMCU ESP8266 for remote...Implementation of vehicle ventilation system using NodeMCU ESP8266 for remote...
Implementation of vehicle ventilation system using NodeMCU ESP8266 for remote...
 
An IOT Project Integrated with RFID and GPRS
An IOT Project Integrated with RFID and GPRSAn IOT Project Integrated with RFID and GPRS
An IOT Project Integrated with RFID and GPRS
 
Low cost smart weather station using Arduino and ZigBee
Low cost smart weather station using Arduino and ZigBeeLow cost smart weather station using Arduino and ZigBee
Low cost smart weather station using Arduino and ZigBee
 
Ijeee 33-36-surveillance system for coal mines based on wireless sensor network
Ijeee 33-36-surveillance system for coal mines based on wireless sensor networkIjeee 33-36-surveillance system for coal mines based on wireless sensor network
Ijeee 33-36-surveillance system for coal mines based on wireless sensor network
 
IRJET- Animal Identification in Roads and Alert System for Passengers usi...
IRJET-  	  Animal Identification in Roads and Alert System for Passengers usi...IRJET-  	  Animal Identification in Roads and Alert System for Passengers usi...
IRJET- Animal Identification in Roads and Alert System for Passengers usi...
 
Design and implementation smart home alarm system with zigbee transceiver
Design and implementation smart home alarm system with zigbee transceiverDesign and implementation smart home alarm system with zigbee transceiver
Design and implementation smart home alarm system with zigbee transceiver
 
Smart safety jacket
Smart safety jacketSmart safety jacket
Smart safety jacket
 
Intelligent Controlled Residence and Face Recognition Technology
Intelligent Controlled Residence and Face Recognition TechnologyIntelligent Controlled Residence and Face Recognition Technology
Intelligent Controlled Residence and Face Recognition Technology
 
IRJET- Home Surveillance Without using CCTV Camera
IRJET-  	  Home Surveillance Without using CCTV CameraIRJET-  	  Home Surveillance Without using CCTV Camera
IRJET- Home Surveillance Without using CCTV Camera
 
IRJET- Intruder Detection Security System
IRJET- Intruder Detection Security SystemIRJET- Intruder Detection Security System
IRJET- Intruder Detection Security System
 
IRJET-Protection for Women using IoT Smart Device with Location and Parameters
IRJET-Protection for Women using IoT Smart Device with Location and ParametersIRJET-Protection for Women using IoT Smart Device with Location and Parameters
IRJET-Protection for Women using IoT Smart Device with Location and Parameters
 
Integrated Mine Safety Monitoring and Alerting System Using Zigbee & Can Bus
Integrated Mine Safety Monitoring and Alerting System Using Zigbee & Can BusIntegrated Mine Safety Monitoring and Alerting System Using Zigbee & Can Bus
Integrated Mine Safety Monitoring and Alerting System Using Zigbee & Can Bus
 
ENERGY MANAGEMENT USING ANDROID APPLICATION
ENERGY MANAGEMENT USING ANDROID APPLICATIONENERGY MANAGEMENT USING ANDROID APPLICATION
ENERGY MANAGEMENT USING ANDROID APPLICATION
 
Ijecet 06 06_007
Ijecet 06 06_007Ijecet 06 06_007
Ijecet 06 06_007
 
IRJET- Low Cost Personal Digital Assistant with IoT and WSN Capabilities
IRJET- Low Cost Personal Digital Assistant with IoT and WSN CapabilitiesIRJET- Low Cost Personal Digital Assistant with IoT and WSN Capabilities
IRJET- Low Cost Personal Digital Assistant with IoT and WSN Capabilities
 

Viewers also liked

Viewers also liked (20)

Ijtra150317
Ijtra150317Ijtra150317
Ijtra150317
 
STUDY OF CARBOHYDRATE METABOLISM IN SEVERE ACUTE MALNUTRITION AND CORRELATION...
STUDY OF CARBOHYDRATE METABOLISM IN SEVERE ACUTE MALNUTRITION AND CORRELATION...STUDY OF CARBOHYDRATE METABOLISM IN SEVERE ACUTE MALNUTRITION AND CORRELATION...
STUDY OF CARBOHYDRATE METABOLISM IN SEVERE ACUTE MALNUTRITION AND CORRELATION...
 
INVESTIGATION OF THE EFFECT OF CURRENT ON TENSILE STRENGTH AND NUGGET DIAMETE...
INVESTIGATION OF THE EFFECT OF CURRENT ON TENSILE STRENGTH AND NUGGET DIAMETE...INVESTIGATION OF THE EFFECT OF CURRENT ON TENSILE STRENGTH AND NUGGET DIAMETE...
INVESTIGATION OF THE EFFECT OF CURRENT ON TENSILE STRENGTH AND NUGGET DIAMETE...
 
EFFECT OF PRUNING AND SKIFFING ON GROWTH AND PRODUCTIVITY OF DARJEELING TEA (...
EFFECT OF PRUNING AND SKIFFING ON GROWTH AND PRODUCTIVITY OF DARJEELING TEA (...EFFECT OF PRUNING AND SKIFFING ON GROWTH AND PRODUCTIVITY OF DARJEELING TEA (...
EFFECT OF PRUNING AND SKIFFING ON GROWTH AND PRODUCTIVITY OF DARJEELING TEA (...
 
130509
130509130509
130509
 
STATE OF ART IN MODERN RESISTANCE SPOT WELDING
STATE OF ART IN MODERN RESISTANCE SPOT WELDINGSTATE OF ART IN MODERN RESISTANCE SPOT WELDING
STATE OF ART IN MODERN RESISTANCE SPOT WELDING
 
ENVISIONING AND IMPLEMENTING PROJECT IN REAL TIME (AN ALGORITHMIC APPROACH)
ENVISIONING AND IMPLEMENTING PROJECT IN REAL TIME (AN ALGORITHMIC APPROACH)ENVISIONING AND IMPLEMENTING PROJECT IN REAL TIME (AN ALGORITHMIC APPROACH)
ENVISIONING AND IMPLEMENTING PROJECT IN REAL TIME (AN ALGORITHMIC APPROACH)
 
FACTORS AFFECTING PROJECT SUSTAINABILITY BEYOND DONOR’S SUPPORT. THE CASE OF ...
FACTORS AFFECTING PROJECT SUSTAINABILITY BEYOND DONOR’S SUPPORT. THE CASE OF ...FACTORS AFFECTING PROJECT SUSTAINABILITY BEYOND DONOR’S SUPPORT. THE CASE OF ...
FACTORS AFFECTING PROJECT SUSTAINABILITY BEYOND DONOR’S SUPPORT. THE CASE OF ...
 
ERROR ESTIMATION IN DEVELOPING GIS MAPS USING DIFFERENT INPUT METHODS OF LAND...
ERROR ESTIMATION IN DEVELOPING GIS MAPS USING DIFFERENT INPUT METHODS OF LAND...ERROR ESTIMATION IN DEVELOPING GIS MAPS USING DIFFERENT INPUT METHODS OF LAND...
ERROR ESTIMATION IN DEVELOPING GIS MAPS USING DIFFERENT INPUT METHODS OF LAND...
 
ROLE OF ICT IN ACHIEVING COMPLETE GENDER EQUALITY IN INDIA
ROLE OF ICT IN ACHIEVING COMPLETE GENDER EQUALITY IN INDIAROLE OF ICT IN ACHIEVING COMPLETE GENDER EQUALITY IN INDIA
ROLE OF ICT IN ACHIEVING COMPLETE GENDER EQUALITY IN INDIA
 
DYNAMIC MONITORING OF THE EFFECT OF SPECIAL KINESITHERAPEUTIC PROGRAM ON PAIN...
DYNAMIC MONITORING OF THE EFFECT OF SPECIAL KINESITHERAPEUTIC PROGRAM ON PAIN...DYNAMIC MONITORING OF THE EFFECT OF SPECIAL KINESITHERAPEUTIC PROGRAM ON PAIN...
DYNAMIC MONITORING OF THE EFFECT OF SPECIAL KINESITHERAPEUTIC PROGRAM ON PAIN...
 
OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...
OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...
OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...
 
MECHANISMS OF PHOTOPERIOD IN REGULATION OF RICE FLOWERING
MECHANISMS OF PHOTOPERIOD IN REGULATION OF RICE FLOWERING MECHANISMS OF PHOTOPERIOD IN REGULATION OF RICE FLOWERING
MECHANISMS OF PHOTOPERIOD IN REGULATION OF RICE FLOWERING
 
IDENTIFICATION OF SUPPLY CHAIN MANAGEMENT PROBLEMS: A REVIEW
IDENTIFICATION OF SUPPLY CHAIN MANAGEMENT PROBLEMS: A REVIEWIDENTIFICATION OF SUPPLY CHAIN MANAGEMENT PROBLEMS: A REVIEW
IDENTIFICATION OF SUPPLY CHAIN MANAGEMENT PROBLEMS: A REVIEW
 
PHYSICO-CHEMICAL AND BACTERIOLOGICAL ASSESSMENT OF RIVER MUDZIRA WATER IN MUB...
PHYSICO-CHEMICAL AND BACTERIOLOGICAL ASSESSMENT OF RIVER MUDZIRA WATER IN MUB...PHYSICO-CHEMICAL AND BACTERIOLOGICAL ASSESSMENT OF RIVER MUDZIRA WATER IN MUB...
PHYSICO-CHEMICAL AND BACTERIOLOGICAL ASSESSMENT OF RIVER MUDZIRA WATER IN MUB...
 
EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...
EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...
EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...
 
IMPROVEMENT OF SUPPLY CHAIN MANAGEMENT BY MATHEMATICAL PROGRAMMING APPROACH
IMPROVEMENT OF SUPPLY CHAIN MANAGEMENT BY MATHEMATICAL PROGRAMMING APPROACHIMPROVEMENT OF SUPPLY CHAIN MANAGEMENT BY MATHEMATICAL PROGRAMMING APPROACH
IMPROVEMENT OF SUPPLY CHAIN MANAGEMENT BY MATHEMATICAL PROGRAMMING APPROACH
 
THE FUNDAMENTAL ANALYSIS-THE BEST WAY TO EVALUATE EQUITY SHARES
THE FUNDAMENTAL ANALYSIS-THE BEST WAY TO EVALUATE EQUITY SHARESTHE FUNDAMENTAL ANALYSIS-THE BEST WAY TO EVALUATE EQUITY SHARES
THE FUNDAMENTAL ANALYSIS-THE BEST WAY TO EVALUATE EQUITY SHARES
 
COMMODITY DERIVATIVE MARKETS IN INDIA
COMMODITY DERIVATIVE MARKETS IN INDIACOMMODITY DERIVATIVE MARKETS IN INDIA
COMMODITY DERIVATIVE MARKETS IN INDIA
 
COMPARATIVE STUDY OF BELL PEPPER ON THE ASPECTS OF THEIR APPROXIMATE ANALYSIS...
COMPARATIVE STUDY OF BELL PEPPER ON THE ASPECTS OF THEIR APPROXIMATE ANALYSIS...COMPARATIVE STUDY OF BELL PEPPER ON THE ASPECTS OF THEIR APPROXIMATE ANALYSIS...
COMPARATIVE STUDY OF BELL PEPPER ON THE ASPECTS OF THEIR APPROXIMATE ANALYSIS...
 

Similar to Efficient Surveillance System with Auto Image Email

Video Surveillance Using Raspberry Pi Architecture
Video Surveillance Using Raspberry Pi ArchitectureVideo Surveillance Using Raspberry Pi Architecture
Video Surveillance Using Raspberry Pi ArchitectureRUTURAJ SHETE
 
IRJET- Intelligent Home Monitoring using IoT for Physically Challenged
IRJET- Intelligent Home Monitoring using IoT for Physically ChallengedIRJET- Intelligent Home Monitoring using IoT for Physically Challenged
IRJET- Intelligent Home Monitoring using IoT for Physically ChallengedIRJET Journal
 
IRJET- Laser Disrupted Security System Via Image Capturing
IRJET- Laser Disrupted Security System Via Image CapturingIRJET- Laser Disrupted Security System Via Image Capturing
IRJET- Laser Disrupted Security System Via Image CapturingIRJET Journal
 
Designing Of Multifunctional Surveillance And Security System
Designing Of Multifunctional Surveillance And Security SystemDesigning Of Multifunctional Surveillance And Security System
Designing Of Multifunctional Surveillance And Security SystemIRJET Journal
 
IRJET - IoT based Surveillance Robot
IRJET -  	  IoT based Surveillance RobotIRJET -  	  IoT based Surveillance Robot
IRJET - IoT based Surveillance RobotIRJET Journal
 
IRJET-5G Mobile Technology
IRJET-5G Mobile TechnologyIRJET-5G Mobile Technology
IRJET-5G Mobile TechnologyIRJET Journal
 
Security System Based on Ultrasonic Sensor Technology
Security System Based on Ultrasonic Sensor TechnologySecurity System Based on Ultrasonic Sensor Technology
Security System Based on Ultrasonic Sensor TechnologyIOSR Journals
 
S.W.A.T – Motion Based Intrusion Detection System
S.W.A.T – Motion Based Intrusion Detection SystemS.W.A.T – Motion Based Intrusion Detection System
S.W.A.T – Motion Based Intrusion Detection SystemIRJET Journal
 
Home Automation Using Arduino and ESP8266
Home Automation Using Arduino and ESP8266Home Automation Using Arduino and ESP8266
Home Automation Using Arduino and ESP8266INFOGAIN PUBLICATION
 
Implementation of vision based intelligent home security system using ARM7
Implementation of vision based intelligent home security system using ARM7Implementation of vision based intelligent home security system using ARM7
Implementation of vision based intelligent home security system using ARM7IRJET Journal
 
IOT Based Environmental Pollution Monitoring System
IOT Based Environmental Pollution Monitoring SystemIOT Based Environmental Pollution Monitoring System
IOT Based Environmental Pollution Monitoring SystemIRJET Journal
 
Industrial Automation Monitor and Control using IoT
Industrial Automation Monitor and Control using IoT Industrial Automation Monitor and Control using IoT
Industrial Automation Monitor and Control using IoT IRJET Journal
 
Literature on safety module for vehicular driver assistance
Literature on safety module for vehicular driver assistance Literature on safety module for vehicular driver assistance
Literature on safety module for vehicular driver assistance IOSR Journals
 
Voice Assistance Based Remote Surveillance System
Voice Assistance Based Remote Surveillance SystemVoice Assistance Based Remote Surveillance System
Voice Assistance Based Remote Surveillance SystemIRJET Journal
 
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULEREAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULEIRJET Journal
 
A Survey on IoT-Based Vehicle Accident Prevention and Emergency Notification ...
A Survey on IoT-Based Vehicle Accident Prevention and Emergency Notification ...A Survey on IoT-Based Vehicle Accident Prevention and Emergency Notification ...
A Survey on IoT-Based Vehicle Accident Prevention and Emergency Notification ...IRJET Journal
 
Floor cleaning robot(autonomus mannual) vatsal shah-ec_4th year
Floor cleaning robot(autonomus mannual)  vatsal shah-ec_4th yearFloor cleaning robot(autonomus mannual)  vatsal shah-ec_4th year
Floor cleaning robot(autonomus mannual) vatsal shah-ec_4th yearVatsal N Shah
 

Similar to Efficient Surveillance System with Auto Image Email (20)

Video Surveillance Using Raspberry Pi Architecture
Video Surveillance Using Raspberry Pi ArchitectureVideo Surveillance Using Raspberry Pi Architecture
Video Surveillance Using Raspberry Pi Architecture
 
PIR based security system
PIR based security systemPIR based security system
PIR based security system
 
IRJET- Intelligent Home Monitoring using IoT for Physically Challenged
IRJET- Intelligent Home Monitoring using IoT for Physically ChallengedIRJET- Intelligent Home Monitoring using IoT for Physically Challenged
IRJET- Intelligent Home Monitoring using IoT for Physically Challenged
 
IRJET- Laser Disrupted Security System Via Image Capturing
IRJET- Laser Disrupted Security System Via Image CapturingIRJET- Laser Disrupted Security System Via Image Capturing
IRJET- Laser Disrupted Security System Via Image Capturing
 
Designing Of Multifunctional Surveillance And Security System
Designing Of Multifunctional Surveillance And Security SystemDesigning Of Multifunctional Surveillance And Security System
Designing Of Multifunctional Surveillance And Security System
 
IRJET - IoT based Surveillance Robot
IRJET -  	  IoT based Surveillance RobotIRJET -  	  IoT based Surveillance Robot
IRJET - IoT based Surveillance Robot
 
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
 
IRJET-5G Mobile Technology
IRJET-5G Mobile TechnologyIRJET-5G Mobile Technology
IRJET-5G Mobile Technology
 
Security System Based on Ultrasonic Sensor Technology
Security System Based on Ultrasonic Sensor TechnologySecurity System Based on Ultrasonic Sensor Technology
Security System Based on Ultrasonic Sensor Technology
 
S.W.A.T – Motion Based Intrusion Detection System
S.W.A.T – Motion Based Intrusion Detection SystemS.W.A.T – Motion Based Intrusion Detection System
S.W.A.T – Motion Based Intrusion Detection System
 
Home Automation Using Arduino and ESP8266
Home Automation Using Arduino and ESP8266Home Automation Using Arduino and ESP8266
Home Automation Using Arduino and ESP8266
 
Implementation of vision based intelligent home security system using ARM7
Implementation of vision based intelligent home security system using ARM7Implementation of vision based intelligent home security system using ARM7
Implementation of vision based intelligent home security system using ARM7
 
IOT Based Environmental Pollution Monitoring System
IOT Based Environmental Pollution Monitoring SystemIOT Based Environmental Pollution Monitoring System
IOT Based Environmental Pollution Monitoring System
 
Industrial Automation Monitor and Control using IoT
Industrial Automation Monitor and Control using IoT Industrial Automation Monitor and Control using IoT
Industrial Automation Monitor and Control using IoT
 
L010127579
L010127579L010127579
L010127579
 
Literature on safety module for vehicular driver assistance
Literature on safety module for vehicular driver assistance Literature on safety module for vehicular driver assistance
Literature on safety module for vehicular driver assistance
 
Voice Assistance Based Remote Surveillance System
Voice Assistance Based Remote Surveillance SystemVoice Assistance Based Remote Surveillance System
Voice Assistance Based Remote Surveillance System
 
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULEREAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
 
A Survey on IoT-Based Vehicle Accident Prevention and Emergency Notification ...
A Survey on IoT-Based Vehicle Accident Prevention and Emergency Notification ...A Survey on IoT-Based Vehicle Accident Prevention and Emergency Notification ...
A Survey on IoT-Based Vehicle Accident Prevention and Emergency Notification ...
 
Floor cleaning robot(autonomus mannual) vatsal shah-ec_4th year
Floor cleaning robot(autonomus mannual)  vatsal shah-ec_4th yearFloor cleaning robot(autonomus mannual)  vatsal shah-ec_4th year
Floor cleaning robot(autonomus mannual) vatsal shah-ec_4th year
 

More from International Journal of Technical Research & Application

More from International Journal of Technical Research & Application (20)

STUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEW
STUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEWSTUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEW
STUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEW
 
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
 
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
 
STUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONS
STUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONSSTUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONS
STUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONS
 
ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...
ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...
ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...
 
POD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTER
POD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTERPOD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTER
POD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTER
 
DIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGA
DIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGADIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGA
DIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGA
 
MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...
MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...
MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...
 
AN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIR
AN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIRAN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIR
AN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIR
 
LI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESS
LI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESSLI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESS
LI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESS
 
QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...
QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...
QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...
 
SCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEW
SCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEWSCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEW
SCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEW
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
 
EFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTY
EFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTYEFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTY
EFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTY
 
THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...
THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...
THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...
 
TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...
TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...
TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...
 
A STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASH
A STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASHA STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASH
A STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASH
 
AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...
AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...
AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...
 
PERFORMANCE ANALYSIS OF MICROSTRIP PATCH ANTENNA USING COAXIAL PROBE FEED TEC...
PERFORMANCE ANALYSIS OF MICROSTRIP PATCH ANTENNA USING COAXIAL PROBE FEED TEC...PERFORMANCE ANALYSIS OF MICROSTRIP PATCH ANTENNA USING COAXIAL PROBE FEED TEC...
PERFORMANCE ANALYSIS OF MICROSTRIP PATCH ANTENNA USING COAXIAL PROBE FEED TEC...
 
OVERVIEW OF TCP PERFORMANCE IN SATELLITE COMMUNICATION NETWORKS
OVERVIEW OF TCP PERFORMANCE IN SATELLITE COMMUNICATION NETWORKSOVERVIEW OF TCP PERFORMANCE IN SATELLITE COMMUNICATION NETWORKS
OVERVIEW OF TCP PERFORMANCE IN SATELLITE COMMUNICATION NETWORKS
 

Recently uploaded

Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 

Recently uploaded (20)

Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 

Efficient Surveillance System with Auto Image Email

  • 1. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 3, Issue 1 (Jan-Feb 2015), PP. 109-112 109 | P a g e Camera EFFICIENT EMBEDDED SURVEILLANCE SYSTEM WITH AUTO IMAGE CAPTURING AND EMAIL SENDING FACILITY Rohit Ratnakar Vaidya Department of Electronics & communication Engineering Deogiri Institute of Engineering and Management Studies, Aurangabad (MS), India Vaidyarohit007@gmail.com Abstract— In this paper we have to design and implement surveillance system by use of smart sensors like ultrasonic sensors and pyroelectric infrared sensors (PIR) to detect an intruder in a home, ATM, Industries, Bank Locker room or a storehouse. The PIR sensors are placed on the ceiling, and the ultrasonic sensor module consists of a transmitter and a receiver which are placed vertically on the wall. We are going to use the camera to capture images of the people those are coming under the surveillance area. And we are sending these images to authorized and related personnel via e-mail to avoid the storage cost. This system will also help to reduce the power consumption. Keywords—AVR Microcontroller; Raspberry Pi; Surveillance System; PIR and ultrasonic Sensors; Webcam; Internet Connections I. INTRODUCTION Recently surveillance systems have become more important for everyone’s and everywhere for the purpose of security. The embedded surveillance system, frequently used in a home, an office or a factory [1-3], uses a sensor triggered to turn on a camera [4-5]. Some designs use different types of sensors to achieve reliability by means of the different features of each sensor [6-7] but they do not provide any facilities like sending an image through internet. In this paper we have to extend this previous system not only by using both multiple PIR sensors and ultrasonic sensors as a sensor group, but also by using the Maximum Voting Mechanism (MVM) [8-11]. Ultrasonic receivers and transmitters are located at opposite ends to reduce the interference from other frequencies in ultrasonic signals. Some research explores the influence of attenuation in air and crosstalk of ultrasonic signals. In our system, We have to use Raspberry Pi credit card-sized computer to send an Email of captured image to the specified Email ID. So that there is no issue of storing images as well no issue of losing the confidential data (captured images). II. SYSTEM ARCHITECTURE As shown in Fig. 1 our system which contains several groups of ultrasonic and PIR sensor. The transmitter circuit generates a multi-frequency square waveform, and the receiver circuit amplifies the received signals and filters out any noise. When a transmitter transmits an ultrasonic coding signal, the ultrasonic receiver determines whether there is an intruder or person passing through the sensing area. If there is no intruder, the MCU (Micro Controller Unit) will keep our camera off but as soon as intruder is detected and camera can capture the image. Our design reduces the environmental interference with the ultrasonic signal. All sensing signals are input to the embedded surveillance system by the GPIO (General purpose input and output), and the MVM program counts the number of sensing states to determine whether to adopt the MVM or not. The PIR sensor groups obtain the sensing signals from human temperature. If the voting results of ultrasonic and PIR sensor groups pass the criteria, the embedded surveillance system starts the camera to capture images. When it capture the image this image is send to the specified Email ID via Internet. Internet Connectivity Figure 1. Use of smart sensors to improve the sensing reliability of an embedded surveillance system A. Software Required We choose Embedded Linux as our operating system. The program of the majority voting mechanism contains a detection of the GPIO function, a counting and majority voting function, an image captured function and a Web server. Fig.3.2 shows the detection software flowchart of the embedded system. The embedded system scans the GPIO sockets, which are connected to external PIR sensors and ultrasonic sensors. To verify the state of each IR and ultrasonic sensor, the embedded system reads the voltage levels of the GPIO sockets. When the system reads 5V from a GPIO socket, we learn that the ultrasonic sensors or the PIR sensors have been triggered and will execute the majority voting program by counting the state of each ultrasonic and PIR sensor. Majority voting is achieved by the sensor groups of the different GPIO sockets. The embedded system, when interrupted by the detection procedure, starts the Web camera to capture images. When this is finished, the embedded system starts the detection procedure over again. If the intruder is still in the monitoring area, the count of the GPIO sockets’ voltage levels continues the majority voting mechanism, and the embedded system again starts the Web camera to capture images. The embedded system uploads the captured images by means of both the Web server and the streaming server through the Internet. User PIR Sensor groups Ultrasonic Sensors Groups Signal Conditi -oning Raspberry Pi Internet Remote Place
  • 2. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 3, Issue 1 (Jan-Feb 2015), PP. 109-112 110 | P a g e  Figure 2. Detection software flowchart  B. Hardware modules We use two groups of the external hardware circuits, the PIR and the ultrasonic sensor group. As the PIR sensor produces a weak voltage, we input the sensed signal to a two-stage OP amplifier to amplify the weak voltage by about 1000 times. Since the amplified signal changes between positive Figure 3. PIR module. and negative voltage, we input this signal to the absolute value circuit, and then we input it to the adjustable comparator to and negative voltage, we input this signal to the absolute value circuit, and then we input it to the adjustable comparator to compare the sensing voltage and the reference voltage which are set according to the environment temperature. Fig. 3 shows the block diagram of the PIR module. Compact and complete, easy to use Pyroelectric Infrared (PIR) Sensor Module for human body detection. Incorporating a Fresnel lens and motion detection circuit. High sensitivity and low noise. Output is a standard 5V active low output signal. Fig. 4 shows the ultrasonic circuit which uses a pulse width modulation (PWM) function in the MCU to send out the desired frequency of the ultrasonic signal. The ultrasonic transducer transforms the voltage waveform into an ultrasonic transmission, and the transducer of the receiver transforms the ultrasonic transmission into the voltage waveform. The ultrasonic sensor can easily be interfaced to microcontrollers where the triggering and measurement can be done using two I/O pin. The sensor transmits an ultrasonic wave and produces an output pulse that corresponds to the time required for the burst echo to return to the sensor. By measuring the echo pulse width, the distance to target can easily be calculated. Figure 4. Ultrasonic Sensor with Controller Table I shows our comparison of the sensing characteristics of both the ultrasonic sensor and the PIR sensor [6]. We have found that the ultrasonic sensor and the PIR sensor can both compensate each other and enhance the overall sensing probability in our design. TABLE I. COMPARISON OF CHARACTERISTICS OF PIR SENSOR AND ULTRASONIC SENSOR Sensors Condition For trigger Effect of Environment temperature Sensing Type Ultrasonic Moving block Independence Line direction PIR Temperature change Dependence Projection area Why Raspberry Pi?  The Raspberry Pi is a credit-card-sized single-board computer developed in the UK. The Raspberry Pi has a Broadcom BCM2835 system on a ip (SoC), which includes an ARM1176JZF- 700 MHz processor, Video Core IV GPU, and was originally shipped with 256 megabytes of RAM, later upgraded to 512 MB. It does not include a built-in hard disk or solid-state drive, but uses an SD card for booting and persistent storage.  The Processor. At the heart of the Raspberry Pi is the same processor you would have found in the iPhone 3G and the Kindle 2, so you can think of the capabilities of the Raspberry Pi as comparable to those powerful little devices. This chip is a 32 bit, 700 MHz System on a Chip, which is built on the ARM11 architecture. ARM chips come in a variety of architectures with different cores configured to provide different capabilities at different price points. The Model B has 512MB of RAM and the Model A has 256 MB.  The Secure Digital (SD) Card slot. You’ll notice there’s no hard drive on the Pi; everything is stored on an SD Card. One reason you’ll want some sort of protective case sooner than later is that the solder joints on the SD socket may fail if the SD card is accidentally bent.  The USB port. On the Model B there are two USB 2.0 ports, but only one on the Model A. Some of the early Raspberry Pi boards were limited in the amount of current that they could provide. Some USB devices can draw up 500mA. The original Pi board supported 100mA or so, but the newer revisions are up to the full USB 2.0 spec. Features of coding signal- In this paper we use a coding signal to increase the reliability of the ultrasonic sensor group. Equation (1) is the function of probability of code breaking. Equation (2) is the function of reliability. when the number of bits increases, the reliability approaches 1. According to Eqs. (1) and (2) we know that with one bit if the probability of code breaking is 0.5, the reliability would be 0.5. To increase the number of bits of the ultrasonic signal code is to increase the reliability. (1) R=1-P
  • 3. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 3, Issue 1 (Jan-Feb 2015), PP. 109-112 111 | P a g e III. ARRANGEMENT Fig.6 shows Arrangement of our experimental environment that detect intruders in a suitable place. We place the PIR sensor on the ceiling or above the detection area. Transmitter and receiver of the ultrasonic sensor module are placed in a line direction. When an intruder enters the detection area, the ultrasonic coding signal will be blocked and the PIR sensors will detect temperature changes. Figure 6. Arrangement of our experimental environment. Table II compares our coding signal and noncoding signal. The coding signal is not interfered with by other frequencies unless their patterns are similar. It is easier to break a noncoding signal than a coding signal. When we add to the bits of the ultrasonic coding signal, the message type rise with . A noncoding signal transmits just two types of messages, 0 and 1. N means number of bits. With more message types, more codes can be used in the same design to decrease the probability of breaking a signal. In our design, when N is equal to 8, the message conbination of the ultrasonic coding signal is 128 times better than that of noncoding signal, and the reliability is enhanced from 0.5 to 0.996 as shown in Eq. (1). TABLE II. COMPARISON OF OUR CODING SIGNAL AND NONCODING SIGNAL Ultrasonic signal patterns Interference by other ultrasonic signal Probability of breaking signal Message combination Reliability Coding Low Low High Noncoding High High 2 Low IV. PERFORMANCE ANALYSIS A. Ultrasonic Sensor- TABLE III TABLE OF ULTRASONIC SENSOR EQUIVALENT OUTPUT VOLTAGE DISATANCE VOLTAGE 15 CM 0.06 mV 20 CM 0.08 mV 25 CM 0.10 mV 30 CM 0.12 mV Figure 7.Ultrasonic Sensor Voltage Vs Distance Graph With 2.5V - 5.5V power provides very short to long-range detection and ranging, in an incredibly small package. The LV-Max detects objects from 0-inches to 254-inches (6.45- meters) and provides sonar range information from 6-inches out to 254-inches with 1-inch resolution. Objects from 0- inches to 6-inches range as 6-inches. The interface output formats IMAGE 1 In Image 1 Upper line of LCD shows the distance of object from all three ultrasonic sensors. Lower line shows all three PIR sensors are ON. IMAGE 2 In image 2 we can see that we get a new mail. Which is like a any common mail. We can send this email to many email ids.
  • 4. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 3, Issue 1 (Jan-Feb 2015), PP. 109-112 112 | P a g e IMAGE 3 In image 3 we can see that image is attached to mail. This is just 70kb to 100kb. That is very small. Here we can see that image “someone is inside the ATM” Emails Used- From: rohitpiproject@gmail.com To: vaidyarohit007@gmail.com IMAGE 4 In image 4 we can see the image when we click on the image. V. CONCLUSION This system shows two different types of sensors which are Improving the overall sensing probability by using the MVM to reduce the shortcomings of both the ultrasonic sensors and the PIR sensors. As well as we are providing the facility of sending live images to certain (Authorized) person via EMAIL. In future may be we are also able to send some videos (clips). REFERENCES [1] Jun Hou, Chengdong Wu, Zhongjia Yuan, Jiyuan Tan, Qiaoqiao Wang and Yun Zhou, “Research of Intelligent Home Security Surveillance System Based on ZigBee,” International Symposium on Intelligent Information Technology Application Workshops, Shanghai, 21-22 Dec. 2008, pp. 554-57. [2] Xiangjun Zhu, Shaodong Ying and Le Ling, “Multimedia sensor networks design for smart home surveillance,” Control and Decision Conference, 2008, Chinese, 2-4 July 2008, pp. 431-435. [3] L. Lo Presti, M. La Cascia, “Real-Time Object Detection in Embedded Video Surveillance Systems,” Ninth International Workshop on Image Analysis for Multimedia Interactive Services, 7-9 May 2008, pp. 151-154. [4] Wen-Tsuen Chen, Po-Yu Chen, Wei-Shun Lee and Chi-Fu Huang, “Design and Implementation of a Real Time Video Surveillance System with Wireless Sensor Networks,” VTC Spring 2008. IEEE Vehicular Technology Conference, 11- 14 May 2008, pp. 218-222. [5] Mikko Nieminen, Tomi Raty, and Mikko Lindholm, “Multi-Sensor Logical Decision Making in the Single Location Surveillance Point System,” Fourth International Conference on Systems, France, 1-6 March 2009, pp. 86- 90. [6] Ying-Wen Bai, Li-Sih Shen and Zong-Han Li, “Design and Implementation of an Embedded Surveillance System by Use of Multiple Ultrasonic Sensors”, The 28th IEEE International Conference on Consumer Electronics, Las Vegas, Nevada, USA, 11-13 Jan. 2010, 11.1-3, pp. 501- 502. [7] Yang Cao, Huijie Zhao, Na Li and Hong Wei “Land-Cover Classification by Airborne LIDAR Data Fused with Aerial Optical Images,” International Workshop on Multi- Platform/Multi-Sensor Remote Sensing and Mapping (M2RSM), Jan. 2011, pp. 1-6. [8] Hai-Wen Zhao, Hong Yue, and He-Gao Cai, “Design of a Distributed Ultrasonic Detecting System Based on Multiprocessor for Autonomous Mobile Robot,” Proceedings of tbe 2007 WSEAS Int. Conference on Circuits, Systems, Signal and Telecommunications, Gold Coast, Australia, January 17-19, 2007, pp. 59-64. [9] Zi-LI Xie and Zong-Han Li, “Design and implementation of a home embedded surveillance system with ultra-low alert power,” IEEE Transactions on Consumer Electronics, Feb. 2011, pp. 153-159. [10] Francesco Alonge, Marco Brancifortem and Francesco Motta, “A novel method of distance measurement based on pulse position modulation and synchronization of chaotic signals using ultrasonic radar systems,” IEEE Transactions on Instrumentation and Measurement, Feb.2009, pp. 318- 329. [11] Shraga Shoval and Johann Borenstein, “Using Coded Sognals to Benefit from Ultrasonic Sensor Crosstalk in Mobile Robot Obstacle Avoidance,” IEEE International Conference on Robotics and Automation, Seoul, Korea, 21- 26 May, 2001, vol.3, pp. 2879-2884.